Posts
All the articles I've posted.
-
Windows Privilege Escalation
This cheatsheet provides a structured methodology for identifying and exploiting Windows privilege escalation vectors. It includes commands, explanations, an...
-
Command and Control (C2) Frameworks
Command and Control (C2) frameworks are software platforms used during red team operations and penetration testing to maintain communication with compromised...
-
Active Directory Breaching Techniques
This cheatsheet focuses on initial access vectors for breaching Active Directory environments. These techniques target the perimeter of an AD forest, allowin...
-
Hash Cracking and Password Attack Techniques
Comprehensive guide to hash cracking and password attack techniques including John the Ripper, Hashcat, and Hydra